CN109428752B - Verification method and device - Google Patents

Verification method and device Download PDF

Info

Publication number
CN109428752B
CN109428752B CN201710757568.1A CN201710757568A CN109428752B CN 109428752 B CN109428752 B CN 109428752B CN 201710757568 A CN201710757568 A CN 201710757568A CN 109428752 B CN109428752 B CN 109428752B
Authority
CN
China
Prior art keywords
check
verification
message
type
checking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710757568.1A
Other languages
Chinese (zh)
Other versions
CN109428752A (en
Inventor
戚芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201710757568.1A priority Critical patent/CN109428752B/en
Publication of CN109428752A publication Critical patent/CN109428752A/en
Application granted granted Critical
Publication of CN109428752B publication Critical patent/CN109428752B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/28Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements

Abstract

The invention provides a checking method and a device, wherein the method comprises the following steps: receiving a check message; determining a check type of the check packet, wherein the check type includes one of: network element level verification and network level verification; and checking the check message by using the check type. The invention solves the technical problem of low usability and business safety caused by only using the client to check in the related technology.

Description

Verification method and device
Technical Field
The invention relates to the field of communication, in particular to a checking method and a checking device.
Background
At present, the services of each operator are popularized in a large range, the frequency of using the network management to open the services is higher and higher in engineering, and in order to ensure the security of the network management configuration service data and reduce the hidden danger of the service data caused by insufficient design, misoperation and the like, a set of complete network management service security check flow does not exist in the related technology.
In the related art, a single-network element configuration type check is deployed at a network management client, and the mode can only be applied to a single-point configuration scene, but in a northbound access or end-to-end management scene, the check rules of the client fail, so that a command is issued to equipment to report an error, and the usability and the service safety are not easy to guarantee.
In view of the above problems in the related art, no effective solution has been found at present.
Disclosure of Invention
The embodiment of the invention provides a verification method and a verification device, which are used for at least solving the problems in the related art.
According to an embodiment of the present invention, there is provided a verification method including: receiving a check message; determining a check type of the check packet, wherein the check type includes one of: network element level verification and network level verification; and checking the check message by using the check type.
Optionally, determining the check type of the check packet includes: acquiring command parameters included in the check message; judging whether the command parameters affect the basic data of other network elements except the target network element receiving the check message; and if the judgment result is yes, determining the verification type to be network level verification, and if the judgment result is no, determining the verification type to be network element level verification.
Optionally, the check type is used to describe a network element location for checking the check packet.
Optionally, when the check type is network element level check, checking the check packet using the check type includes: acquiring a check rule from a local adapter; and checking the check message by using the check rule.
Optionally, when the check type is network level check, checking the check packet using the check type includes: and sending the check message to a network server for checking, decoding the check message by the network server according to the configuration file, and calling a check rule to check the check message after decoding is completed.
Optionally, the checking the check packet by using the check type includes one of: when the check message is issued through the client, adopting a preset judgment standard, and judging whether the check message meets the standard according to each function command list on the client; when the check message is issued by the northbound interface service process, an interface list provided by the northbound service is taken as a check standard, and whether the issued command meets the standard interface list or not is judged; and when the check message is issued by the end-to-end service process, adopting a control command provided by the end-to-end as a check standard, and judging whether the issued command meets a standard command list.
Optionally, after the check packet is checked by using the check type, the method further includes: and when the verification is passed, returning a failure result, and when the verification is passed, returning a normal result and issuing the verification message to the target network element through the server.
According to another embodiment of the present invention, there is provided a verification apparatus including: the receiving module is used for receiving the check message; a determining module, configured to determine a check type of the check packet, where the check type includes one of: network element level verification and network level verification; and the checking module is used for checking the checking message by using the checking type.
Optionally, the determining module includes: an obtaining unit, configured to obtain a command parameter included in the check packet; a judging unit, configured to judge whether the command parameter affects basic data of other network elements except a target network element that receives the check packet; and the determining unit is used for determining the checking type as network level checking if the judging result is yes, and determining the checking type as network element level checking if the judging result is no.
According to still another embodiment of the present invention, there is also provided a storage medium. The storage medium is configured to store program code for performing the steps of:
receiving a check message;
determining a check type of the check packet, wherein the check type includes one of: network element level verification and network level verification;
and checking the check message by using the check type.
By selecting the service security check of two levels of the network element level and the network level, the invention solves the technical problems of low usability and service security caused by only using the client for checking in the related technology, improves the practicability and the user experience, greatly reduces the probability of engineering faults with larger influence such as service interruption and the like, and reduces the difficulty, the cost and the risk of engineering maintenance personnel for maintaining the service.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
FIG. 1 is a flow chart of a verification method according to an embodiment of the invention;
fig. 2 is a block diagram of a configuration of a verifying apparatus according to an embodiment of the present invention;
FIG. 3 is a flow diagram of a service security check mechanism of an embodiment of the present invention;
fig. 4 is a flowchart of a service security verification mechanism provided in an embodiment of the present invention.
Detailed Description
The invention will be described in detail hereinafter with reference to the accompanying drawings in conjunction with embodiments. It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order.
Example 1
In this embodiment, a verification method is provided, and fig. 1 is a flowchart of the verification method according to the embodiment of the present invention, as shown in fig. 1, the flowchart includes the following steps:
step S102, receiving a check message;
step S104, determining the check type of the check message, wherein the check type comprises one of the following: network element level verification and network level verification;
and step S106, checking the check message by using the check type.
Through the steps, the technical problems of low usability and low business safety caused by the fact that only a client can be used for verification in the related technology are solved by selecting the business safety verification of two levels of the network element level and the network level, the practicability and the user experience are improved, the probability of engineering faults which have great influence such as business interruption is greatly reduced, and the difficulty, the cost and the risk of engineering maintenance personnel for maintaining the business are reduced.
Optionally, the main body of the above steps may be a checking network element, such as a checking server, a client, etc., but is not limited thereto.
Optionally, the check type is used to describe a network element location for checking the check packet. The network element level check and the network level check are performed at different positions respectively, the network element level check is performed locally at the client, and the network level check is performed by sending to a remote server.
Optionally, determining the check type of the check packet includes:
s11, obtaining command parameters included in the check message;
s12, judging whether the command parameter affects the basic data of other network elements except the target network element receiving the check message; and during local verification, the target network element is the local client.
And S13, if the judgment result is yes, determining the verification type as network level verification, and if the judgment result is no, determining the verification type as network element level verification.
In this embodiment, when the check type is the network element level check, the checking the check packet by using the check type includes:
s21, obtaining the check rule from the local adapter;
and S22, checking the check message by using the check rule.
In this embodiment, when the check type is network level check, checking the check packet using the check type includes: and sending the check message to a network server for checking, decoding the check message by the network server according to the configuration file, and calling a check rule to check the check message after decoding is completed.
In this embodiment, the verification rules are different according to different sending ends of the verification message, and the verifying the verification message by using the verification type includes one of the following steps:
when the check message is issued through the client, adopting a preset judgment standard, and judging whether the check message meets the standard according to each function command list on the client;
when the check message is issued by the northbound interface service process, an interface list provided by the northbound service is taken as a check standard, and whether the issued command meets the standard interface list or not is judged;
when the check message is issued by the end-to-end service process, the control command provided by the end-to-end is taken as the check standard, and whether the issued command meets the standard command list or not is judged.
Optionally, after the check packet is checked by using the check type, the method further includes: and when the verification is passed, returning a failure result, and when the verification is passed, returning a normal result and issuing the verification message to the target network element through the server. And when the target network element is the application, the service is issued to the corresponding service.
Through the above description of the embodiments, those skilled in the art can clearly understand that the method according to the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but the former is a better implementation mode in many cases. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
Example 2
In this embodiment, a verification apparatus is further provided, and the verification apparatus is used to implement the foregoing embodiments and preferred embodiments, and the description already made is omitted. As used below, the term "module" may be a combination of software and/or hardware that implements a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated.
Fig. 2 is a block diagram of a structure of a verification apparatus according to an embodiment of the present invention, and as shown in fig. 2, the apparatus includes:
a receiving module 20, configured to receive a check message;
a determining module 22, configured to determine a check type of the check packet, where the check type includes one of: network element level verification and network level verification;
and the checking module 24 is configured to check the check packet by using the check type.
Optionally, the determining module includes: the acquisition unit is used for acquiring command parameters included in the check message; a judging unit, configured to judge whether the command parameter affects basic data of other network elements except for a target network element that receives the check message; and the determining unit is used for determining the checking type as network level checking if the judging result is yes, and determining the checking type as network element level checking if the judging result is no.
It should be noted that, the above modules may be implemented by software or hardware, and for the latter, the following may be implemented, but not limited to: the modules are all positioned in the same processor; alternatively, the modules are respectively located in different processors in any combination.
Example 3
This embodiment is an alternative embodiment of the present invention, and is used to describe the present application in detail and in addition to the specific examples:
the embodiment provides a service security verification mechanism and a method. The method comprises single network element setting command verification and network level function verification. The client checks the sink adapter and is only suitable for a single-point setting command. For the client verification of the network level function, the client is sunk to the server for verification.
The method of the embodiment comprises the following steps:
the method comprises the following steps: network element level function verification (network element level verification)
In the related technology, a plurality of single-point configuration check methods are deployed at a network management client, and the problem of the mode is not great in a normal single-point configuration scene, but in a north access or end-to-end management scene, the check rules of the client fail, so that a command is issued to equipment to report an error, the time consumption is long from the command issuing to the return failure, and the rollback failure is easily caused by excessive issuing of wrong information, so that a network management server has a large amount of redundant data. The usability and the service safety are not easy to guarantee.
For the above reasons, in order to make the various verification rules as reusable as possible, it is considered to sink the various verifications performed by the client to the adapter. After the verification sinks to the adapter, the basic verification logic does not need to be changed, but compared with the client verification, the user can be directly prompted, the adapter verification only can throw out the exception, and a corresponding error code needs to be applied, which is the difference between the two. The network element level check of the single point setting command is scattered in each adapter and client at present, is scattered and is not suitable for uniform control and maintenance, a network element level uniform check module can be considered to be abstracted, and the scattered check processing of the original client and the adapter is centralized in the module.
The position of the unified check module in the whole network management architecture flow can have two options.
1. Adding a check layer between the subnet manager and the adapter;
under the structure, the check module is an independent layer, each command code sent to the adapter passes through the layer, and the check module is divided into three sub-modules of decoding, checking and framing. However, this method needs to change the adapter frame, the adapter subnet manager does not directly distribute to the adapter object after receiving the command, but transmits to the network element unified check module first, and the input parameters need to include the network element name and the command message. After the verification is passed, the verification framework needs to distribute the command to the corresponding adapter object according to the network element name.
2. The unified check module appears in the form of adapter public process and is directly embedded into the configuration flow of the existing adapter command code.
In the mode, the platform adapter framework is not required to be changed, the network element level check module provides an adapter public process externally and is directly embedded into an adapter command code configuration file, the check rule used by the command is directly configured in the parameter of the process, and the adapter framework is slightly changed in the mode.
The second method comprises the following steps: network level function check (network level check)
In this scenario, if a single point modifies the basic data of a certain network element, a service using the IP address by other network elements in the network may fail, and there is a risk of service interruption.
For the above reasons, it is necessary to perform network-level verification on some key basic data and service setting type commands of a single point. Considering that the requirement of network level check will increase gradually, a network level unified check module is added in the network management architecture.
The unified checking module is positioned in the server and comprises a checking frame, a checking message decoding module and a checking rule processing module.
After receiving the message sent by the client, the check framework needs to decode the current command before implementing the check, and each check rule processing class only receives the input parameters of a fixed type, so that the reusability of each check rule can be improved as much as possible. The decoding work is taken charge of by the decoding module, a decoding interface can be abstracted, and the decoding interface is realized by each application to process the decoding work. The check framework may load the decode processing class via a configuration file.
And after decoding the original message, the decoding module processes the message into a data type which can be identified by the check rule and then returns the data type to the check framework.
After the check message decoding work is finished, the check frame distributes the data formed by decoding to each check processing class for formal check. In order to decouple all the check rules so that all the applications can realize all the check rules by themselves, the check framework provides a common check interface, and all the check rules realize the interface.
The calibration rules calibrate the parameters according to certain service logic, if the calibration is not passed, the calibration rules throw out exception, and the whole calibration process is interrupted; if the check passes, the checking framework passes responsibility to the next checking rule class.
The whole process is as follows:
1. and the decoding module is responsible for receiving the check message and calling the decoding module to decode according to the configuration file.
2. And after the decoding is finished, calling a verification rule corresponding to the command code to verify the message according to the configuration file.
3. After the verification is passed, the message is redirected to a final destination.
The network level checks employ concurrency control. Only the data is checked, and for illegal operation, the prompt is only needed to prompt that the operation is not allowed, and automatic association processing is not carried out. Therefore, the verification only relates to the checking of the network element data, does not relate to the modification of the network element data, and can consider the concurrent verification of multiple commands considering the cost performance of input and output, and the network-level verification framework does not perform special concurrent control on the concurrent verification and does not lock related network elements.
The check rule is different according to different processing mechanisms of external services of the access server, and comprises the following steps:
if the command is issued through the client, the original judgment standard is directly adopted, whether the issued command meets the standard or not is judged according to each functional command list on the client, if not, a failure result is returned, otherwise, a normal result is returned and issued to the equipment through the server;
if the north interface service process is accessed to the server, the interface list provided by the north service is used as a check standard to judge whether the issued command meets the standard interface list, if not, a failure result is returned, otherwise, a normal result is returned and issued to the equipment through the server;
if the access server is an end-to-end service process, the control command provided end-to-end is taken as a check standard to judge whether the issued command is attached to a standard command list, if not, a failure result is returned, and a normal result is returned and issued to the equipment through the server.
Fig. 3 is a flowchart of a service security check mechanism according to an embodiment of the present invention, and the service security check mechanism and method for a single network element include:
as described in the first method, if a single-point setting command, such as some parameters of a service configuration command, does not refer to basic data of other network elements and only affects the local network element, a network element level check module is used to centralize the dispersed check processing of the original client and adapter in the module. Under the structure, the checking module is an independent layer, all command codes sent to the adapter can pass through the layer, the checking rules are relatively centralized, and unified control and maintenance are utilized.
As described in the second method, the network-level check module is used for a single-point setting command, for example, some parameters of the service configuration class command refer to the basic data of other network elements. The network level check module adopts concurrency control, analyzes abnormal code streams after decomposition and processing of three sub-modules of the check frame, the decoding module and the check rule processing module, and reports the abnormal code streams to the client to throw the abnormal code streams for judgment of users. The processing mode has high processing speed and clear processing flow, and can accurately process the abnormal code stream, thereby greatly improving the safety of single-point service.
Fig. 4 is a flow chart of a service security verification mechanism provided in the embodiment of the present invention, which includes:
the method comprises the following steps: and issuing a verification command and receiving data.
Step two: the client judges whether the command is at the network element level. If the network element level is the network element level, a network element level checking method is started, and a checking result is returned.
Step three: the server determines if it is a network level command.
Step four: and judging whether the access is the access of a northbound interface.
Step five: if the command is accessed by the northbound interface, whether the command is correct is judged according to an interface check list provided by the northbound interface.
Step six: and judging whether the access is end-to-end access.
Step seven: if the access is end-to-end, whether the command is correct is judged according to the standard command specification provided by the end-to-end item.
Step eight: the verification is complete and the result is returned.
Step nine: and finishing the verification.
Through the network management service security verification mechanism and method provided by the embodiment, after a client receives a command, whether the command only affects the local network element is judged, if so, the command is issued to an adapter, and an illegal command or an abnormal command is processed by a network element level verification module of the adapter; if the command also affects other network elements, the command is issued to the server, and the network level check module located in the server processes the illegal command or exception.
The scheme of the embodiment not only reduces the risks of reducing the efficiency of the client and even abnormal exit caused by the fact that a large number of abnormal codes are concentrated in the client for processing, but also ensures the efficiency of processing commands by the client; the abnormal information processed is very accurate and efficient, the accuracy of the service safety check is improved, the practicability and the user experience of the function are improved through the service safety check of two levels of a network element level and a network level, the probability of engineering faults which are greatly influenced by service interruption and the like is greatly reduced, and the difficulty, the cost and the risk of maintaining the service by engineering maintenance personnel are reduced.
Example 4
The embodiment of the invention also provides a storage medium. Alternatively, in the present embodiment, the storage medium may be configured to store program codes for performing the following steps:
s1, receiving a check message;
s2, determining the check type of the check message, wherein the check type includes one of the following: network element level verification and network level verification;
and S3, checking the check message by using the check type.
Optionally, in this embodiment, the storage medium may include, but is not limited to: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Optionally, in this embodiment, the processor executes receiving of the check message according to a program code already stored in the storage medium;
optionally, in this embodiment, the processor performs, according to a program code stored in the storage medium, determination of a check type of the check packet, where the check type includes one of: network element level verification and network level verification;
optionally, in this embodiment, the processor performs checking on the check packet by using the check type according to the program code stored in the storage medium.
Optionally, the specific examples in this embodiment may refer to the examples described in the above embodiments and optional implementation manners, and this embodiment is not described herein again.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and alternatively, they may be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, and in some cases, the steps shown or described may be performed in an order different than that described herein, or they may be separately fabricated into individual integrated circuit modules, or multiple ones of them may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A method of verification, comprising:
receiving a check message;
determining a check type of the check packet, wherein the check type includes one of: network element level verification and network level verification;
the checking the check message by using the check type comprises one of the following steps:
when the check message is issued through the client, adopting a preset judgment standard, and judging whether the check message meets the standard according to each function command list on the client;
when the check message is issued by the northbound interface service process, an interface list provided by the northbound service is taken as a check standard, and whether the issued command meets the standard interface list or not is judged;
and when the check message is issued by the end-to-end service process, adopting a control command provided by the end-to-end as a check standard, and judging whether the issued command meets a standard command list.
2. The method of claim 1, wherein the check type is used to describe a network element location for checking the check packet.
3. The method of claim 1, wherein determining the type of check of the check packet comprises:
acquiring command parameters included in the check message;
judging whether the command parameters affect the basic data of other network elements except the target network element receiving the check message;
and if the judgment result is yes, determining the verification type to be network level verification, and if the judgment result is no, determining the verification type to be network element level verification.
4. The method of claim 1, wherein when the check type is a network element level check, checking the check packet using the check type comprises:
acquiring a check rule from a local adapter;
and checking the check message by using the check rule.
5. The method of claim 1, wherein when the check type is network level check, checking the check packet using the check type comprises:
and sending the check message to a network server for checking, decoding the check message by the network server according to the configuration file, and calling a check rule to check the check message after decoding is completed.
6. The method of claim 1, wherein after the check packet is checked using the check type, the method further comprises:
and when the verification is passed, returning a failure result, and when the verification is passed, returning a normal result and issuing the verification message to the target network element through the server.
7. A verification apparatus, comprising:
the receiving module is used for receiving the check message;
a determining module, configured to determine a check type of the check packet, where the check type includes one of: network element level verification and network level verification;
the checking module is configured to check the check packet by using the check type, where the check includes one of:
when the check message is issued through the client, adopting a preset judgment standard, and judging whether the check message meets the standard according to each function command list on the client;
when the check message is issued by the northbound interface service process, an interface list provided by the northbound service is taken as a check standard, and whether the issued command meets the standard interface list or not is judged;
and when the check message is issued by the end-to-end service process, adopting a control command provided by the end-to-end as a check standard, and judging whether the issued command meets a standard command list.
8. The apparatus of claim 7, wherein the determining module comprises:
an obtaining unit, configured to obtain a command parameter included in the check packet;
a judging unit, configured to judge whether the command parameter affects basic data of other network elements except a target network element that receives the check packet;
and the determining unit is used for determining the checking type as network level checking if the judging result is yes, and determining the checking type as network element level checking if the judging result is no.
9. A storage medium, comprising a stored program, wherein the program when executed performs the method of any one of claims 1 to 6.
10. A processor, characterized in that the processor is configured to run a program, wherein the program when running performs the method of any of claims 1 to 6.
CN201710757568.1A 2017-08-29 2017-08-29 Verification method and device Active CN109428752B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710757568.1A CN109428752B (en) 2017-08-29 2017-08-29 Verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710757568.1A CN109428752B (en) 2017-08-29 2017-08-29 Verification method and device

Publications (2)

Publication Number Publication Date
CN109428752A CN109428752A (en) 2019-03-05
CN109428752B true CN109428752B (en) 2021-11-02

Family

ID=65503680

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710757568.1A Active CN109428752B (en) 2017-08-29 2017-08-29 Verification method and device

Country Status (1)

Country Link
CN (1) CN109428752B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113794583B (en) * 2021-08-15 2023-12-29 新华三信息安全技术有限公司 Configuration method and device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009084806A1 (en) * 2008-01-02 2009-07-09 Sung-Man Lee System and method for operating end-to-end security channel between server and ic card
CN101668020A (en) * 2009-09-24 2010-03-10 中兴通讯股份有限公司 Validation method of stream control transmission protocol, system, server side and client side
WO2013014609A1 (en) * 2011-07-25 2013-01-31 Koninklijke Philips Electronics N.V. Methods, devices and systems for establishing end-to-end secure connections and for securely communicating data packets
CN104022948A (en) * 2014-06-13 2014-09-03 中国民航信息网络股份有限公司 Type X message transmission system and method
CN104769556A (en) * 2012-10-11 2015-07-08 美光科技公司 Updating reliability data
CN105898750A (en) * 2016-05-27 2016-08-24 北京奇虎科技有限公司 WiFi access point equipment and WiFi access authentication method and device
CN106603259A (en) * 2015-10-16 2017-04-26 大唐移动通信设备有限公司 Configuration data verification method and device of network element, and network management equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009084806A1 (en) * 2008-01-02 2009-07-09 Sung-Man Lee System and method for operating end-to-end security channel between server and ic card
CN101668020A (en) * 2009-09-24 2010-03-10 中兴通讯股份有限公司 Validation method of stream control transmission protocol, system, server side and client side
WO2013014609A1 (en) * 2011-07-25 2013-01-31 Koninklijke Philips Electronics N.V. Methods, devices and systems for establishing end-to-end secure connections and for securely communicating data packets
CN104769556A (en) * 2012-10-11 2015-07-08 美光科技公司 Updating reliability data
CN104022948A (en) * 2014-06-13 2014-09-03 中国民航信息网络股份有限公司 Type X message transmission system and method
CN106603259A (en) * 2015-10-16 2017-04-26 大唐移动通信设备有限公司 Configuration data verification method and device of network element, and network management equipment
CN105898750A (en) * 2016-05-27 2016-08-24 北京奇虎科技有限公司 WiFi access point equipment and WiFi access authentication method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"变电站合并单元测试设备校验系统及其实现";欧阳帆等;《电力系统自动化》;20170623;全文 *

Also Published As

Publication number Publication date
CN109428752A (en) 2019-03-05

Similar Documents

Publication Publication Date Title
US10708289B2 (en) Secured event monitoring leveraging blockchain
US11075819B2 (en) Identifying unauthorized changes to network elements and determining the impact of unauthorized changes to network elements on network services
US9699028B2 (en) Method and device for updating client
US10798218B2 (en) Environment isolation method and device
US10567232B2 (en) System and method for mapping a connectivity state of a network
US10708230B2 (en) Systems and methods for firewall configuration using block lists
US11716251B2 (en) Communication system, provider node, communication node, and method for providing a virtual network function to a customer node
US11245577B2 (en) Template-based onboarding of internet-connectible devices
US20090271510A1 (en) Network state platform
CN112039868A (en) Firewall policy verification method, device, equipment and storage medium
US11245709B2 (en) Multi-verifier approach for attestation of nodes in a network
US20070174462A1 (en) Reporting information to a network
US11516071B2 (en) Method and system for root cause analysis across multiple network systems
CN105704154B (en) A kind of service processing method based on RESTful, apparatus and system
US9942116B2 (en) Interconnecting electronic devices for reporting device status
US10318911B1 (en) Persistenceless business process management system and method
CN109428752B (en) Verification method and device
EP2887703A1 (en) Application protection in a mobile telecommunication device
CN112714166A (en) Multi-cluster management method and device for distributed storage system
CN108038782B (en) Security system for securities trading and security verification method for securities trading
KR20210027038A (en) Proxy apparatus and method for processing information executed on proxy apparatus
US11711373B2 (en) Platform-based authentication for external services
US20070133597A1 (en) Method and network management system for service-oriented planning and expansion of a communication network
CN105635153B (en) The access method and system of multi-tenant B/S software systems
CN111147533A (en) System and method for uploading selected configuration to user equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant